SlideShare a Scribd company logo
2
Most read
4
Most read
5
Most read
ACCESS CONTROL SYSTEM
S.PAHEERATHAN P a g e | 1
ACCESS CONTROL
1. access control is a means of controlling who enters a location
and when.
2. The person entering may be an employee, a contractor or a
visitor and they may be on foot, driving a vehicle or using
another mode of transport.
3. The location they’re entering may be, for example, a site, a
building, a room or a cabinet.
Two Types of Access Control:
1. Physical And
2. Logical.
1. Physical access control limits access to campuses, buildings,
rooms and physical IT assets.
2. Logical access control limits connections to computer networks,
system files and data.
Access control systems perform identification authentication and
authorization of users and entities by evaluating required login
credentials that can include passwords, personal identification
numbers (PINs), biometric scans, security tokens or other
authentication factors.
Why is access control important?
The access control is to minimize the security risk of unauthorized
access to physical and logical systems.
Physical access control system is usually referring to an electronic
security system.
ACCESS CONTROL SYSTEM
S.PAHEERATHAN P a g e | 2
Passwords, PINs, Smart Keys, Smart Cards, etc. are generally used
to authenticate people and allow them access to both physical as
well as digital domains.
But the problems with this type of authentication is that passwords
and PINs can be easily forgotten (or hard to remember) or can be
stolen; smart keys and tokens can be easily misplaced, duplicated
or forgotten; smart cards with magnetic strips can be easily
corrupted.
 Use of Biometrics in authentication and verification
1. Every human being possesses certain unique features in terms
of both physiological and behavioural characteristics that are
different from everybody else.
2. a person’s biometrics or biological traits cannot be stolen,
forgotten or misplaced and hence they provide a much better,
secure and reliable way to authenticate an individual when
compared to the traditional methods.
3. commonly used Biometrics are fingerprints, iris, face,
geometry of hand, speech, gait, signature and keystroke.
Biometric Sensors
A Biometric Sensor is a device (or a transducer, to be specific)
that converts the biometric trait of an individual into
electrical signals.
ACCESS CONTROL SYSTEM
S.PAHEERATHAN P a g e | 3
Biometric Sensors are usually semiconductor devices that
processes images from an individual’s physical
characteristics using complex algorithms.
Many physical characteristics of a person like face, iris,
fingerprints, etc. are scanned by a Biometric Sensor and are
converted to a digital image using an Analog – to – Digital
Converter.
This digital information of the person is stored in a memory
and is used to verify or authenticate his/her identity.
Biometric System
There are two types of Biometric operations that can be
performed using the images captured by Biometric Sensors.
They are:
1. Identification
2. Verification
 In Identification mode, a Biometric System identifies a
person from the pool of enrolled personnel by searching the
database and based on match for biometrics. This mode
answers the “Who am I?” question about a person.
 I verification mode, the Biometric System verifies the
person’s identity based on the previously enrolled
ACCESS CONTROL SYSTEM
S.PAHEERATHAN P a g e | 4
biometrics. In this mode, the “Am I whom I claim to be?”
question about an individual is answered.
 MICROPHONE/MIC (WIRED & WIRELESS)
 SPEAKER/LOUD SPEAKER
 SOUND MIXER / MIXING CONSOLE
 SOUND AMPLIFIER/POWER AMPLIFIER
 MUSIC PLAYER
 CABLES
the operation of a typical Biometric System can be divided into
three components. They are:
1. Enrolment
2. Matching (or Testing)
3. Decision Making
ACCESS CONTROL SYSTEM
S.PAHEERATHAN P a g e | 5
Types of Biometric Sensors
 Fingerprint Sensors
 Face Recognition
 Iris Recognition
 Speech Recognition
 Hand Geometry
 Signature Verification
Fingerprint Sensors
ACCESS CONTROL SYSTEM
S.PAHEERATHAN P a g e | 6
The device that is used to capture digital image of a fingerprint
pattern is known as Fingerprint Sensor.
The captured image, which is known as live image, is processed to
create a digital template with extracted features.
This template is stored in the database for matching.
Based on the fingerprint ridges, there are three fingerprint
patterns called:
1. Loop
2. Arch
3. Whorl
ACCESS CONTROL SYSTEM
S.PAHEERATHAN P a g e | 7
Based on the technology used to capture the fingerprint images,
fingerprint sensors are further classified into different kinds.
 Capacitive Sensors
 Optical Sensors
 Ultrasonic Sensors
 RF Sensors
 Thermal Sensors
 Pressure Sensors
Watch these videos for more info
1. https://www.youtube.com/watch?v=2QTFiQVdrgg
2. https://www.youtube.com/watch?v=trn_R5TOaGU
3. https://www.youtube.com/watch?v=XvR6ww7F54
w
4. https://www.youtube.com/watch?v=9y-yYEUS8c4
5. https://www.youtube.com/watch?v=MEQ451O6og
M

More Related Content

PPTX
Access-control-system
PDF
Access Control System, BMS
PDF
Building management-system power point
PPTX
FIRE ALARM SYSTEM
PPTX
Fingerprint
PPTX
Perimeter security systems
PPTX
Fire Detection and Alarm Systems
PPTX
Surveilance ppt
Access-control-system
Access Control System, BMS
Building management-system power point
FIRE ALARM SYSTEM
Fingerprint
Perimeter security systems
Fire Detection and Alarm Systems
Surveilance ppt

What's hot (20)

PPT
Building management system (bms)
PPT
Fire alarm systems
PPTX
PDF
Building Management Services
PPTX
Access control system
PPTX
Types of cctv camera
PDF
Smart Home Automation System ALAYOUBI TECHNOLOGIES
PDF
Cctv training manual
PPT
50409621003 fingerprint recognition system-ppt
PPT
IP CCTV Introduction
PPTX
Security system
PPTX
Cctv presentation
PPTX
Fire detection and alarm system
PDF
CCTV Basic
PPTX
CCTV Presentation
PDF
Biometric Technology
PPT
Bms for security systems
PPTX
CCTV Security Cameras - Basics
PPT
CCTV-Powerpoint-Presentation
PPT
Cctv And Ip Surveillance
Building management system (bms)
Fire alarm systems
Building Management Services
Access control system
Types of cctv camera
Smart Home Automation System ALAYOUBI TECHNOLOGIES
Cctv training manual
50409621003 fingerprint recognition system-ppt
IP CCTV Introduction
Security system
Cctv presentation
Fire detection and alarm system
CCTV Basic
CCTV Presentation
Biometric Technology
Bms for security systems
CCTV Security Cameras - Basics
CCTV-Powerpoint-Presentation
Cctv And Ip Surveillance
Ad

Similar to Access control system (20)

PDF
Access Control Presentation
PDF
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
PDF
Principles of Information Security 5th Edition Whitman Solutions Manual
PPTX
Chapter 5 Identity Access Management.pptx
PDF
Principles of Information Security 5th Edition Whitman Solutions Manual
PDF
access control systems.pdf Physical Security Domains
PDF
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PPT
Class 8, 9 and 10
PDF
Principles of Information Security 5th Edition Whitman Solutions Manual
PPT
Information Security Principles - Access Control
PDF
Principles of Information Security 5th Edition Whitman Solutions Manual
PDF
Principles of Information Security 5th Edition Whitman Solutions Manual
PPTX
Chapter-Six.pptxhyjhgjghjghjghjghjghjghjghjg
PDF
Principles of Information Security 5th Edition Whitman Solutions Manual
PPTX
Whitman_Ch06.pptx
PDF
Full download Principles of Information Security 5th Edition Whitman Solution...
PDF
Advancing Security The Biometric Access Control System.pdf
PPTX
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
PDF
Principles of Information Security 5th Edition Whitman Solutions Manual
PPTX
kuchtohhainayacnayjdhcxjxnusbxjnxjsbxhsjnkxbs.pptx
Access Control Presentation
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Principles of Information Security 5th Edition Whitman Solutions Manual
Chapter 5 Identity Access Management.pptx
Principles of Information Security 5th Edition Whitman Solutions Manual
access control systems.pdf Physical Security Domains
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
Class 8, 9 and 10
Principles of Information Security 5th Edition Whitman Solutions Manual
Information Security Principles - Access Control
Principles of Information Security 5th Edition Whitman Solutions Manual
Principles of Information Security 5th Edition Whitman Solutions Manual
Chapter-Six.pptxhyjhgjghjghjghjghjghjghjghjg
Principles of Information Security 5th Edition Whitman Solutions Manual
Whitman_Ch06.pptx
Full download Principles of Information Security 5th Edition Whitman Solution...
Advancing Security The Biometric Access Control System.pdf
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
Principles of Information Security 5th Edition Whitman Solutions Manual
kuchtohhainayacnayjdhcxjxnusbxjnxjsbxhsjnkxbs.pptx
Ad

More from Paheerathan Sabaratnam (20)

PDF
PLc Memory & Addressing
PDF
Pneumatic valves
PDF
Plc lad simulator
PDF
Plc programming languages
PDF
Pneumatic actuator
PDF
PLC PROGRAMMING- COUNTER INSTRUCTION
PDF
PLC PROGRAMMING- TIMER INSTRUCTION
PDF
PDF
PDF
PUBLIC ADDRESSING SYSTEM (PA SYSTEM)
PDF
University college act
PDF
CCTV CAMERA & SELECTION CRITERIA , CAMERA IMAGE QUALITY
PPTX
CCTV System - Close circuit television System - UCJ
PPTX
CCTV System - Close circuit television System - UCJ
PPTX
CCTV System - Close circuit television System - UCJ
PPTX
CCTV System - Close circuit television System - UCJ
PPTX
CCTV System - Close circuit television System - UCJ
PPTX
CCTV System - Close circuit television System - UCJ
PPTX
CCTV System - Close circuit television System - UCJ
PPTX
CCTV System - Close circuit television System - UCJ
PLc Memory & Addressing
Pneumatic valves
Plc lad simulator
Plc programming languages
Pneumatic actuator
PLC PROGRAMMING- COUNTER INSTRUCTION
PLC PROGRAMMING- TIMER INSTRUCTION
PUBLIC ADDRESSING SYSTEM (PA SYSTEM)
University college act
CCTV CAMERA & SELECTION CRITERIA , CAMERA IMAGE QUALITY
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ

Recently uploaded (20)

PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPT
What is a Computer? Input Devices /output devices
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Modernising the Digital Integration Hub
PPTX
Chapter 5: Probability Theory and Statistics
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Getting Started with Data Integration: FME Form 101
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
The various Industrial Revolutions .pptx
OMC Textile Division Presentation 2021.pptx
Zenith AI: Advanced Artificial Intelligence
Group 1 Presentation -Planning and Decision Making .pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Getting started with AI Agents and Multi-Agent Systems
DP Operators-handbook-extract for the Mautical Institute
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
WOOl fibre morphology and structure.pdf for textiles
What is a Computer? Input Devices /output devices
Web App vs Mobile App What Should You Build First.pdf
observCloud-Native Containerability and monitoring.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Modernising the Digital Integration Hub
Chapter 5: Probability Theory and Statistics
A novel scalable deep ensemble learning framework for big data classification...
Getting Started with Data Integration: FME Form 101
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Enhancing emotion recognition model for a student engagement use case through...
A contest of sentiment analysis: k-nearest neighbor versus neural network
The various Industrial Revolutions .pptx

Access control system

  • 1. ACCESS CONTROL SYSTEM S.PAHEERATHAN P a g e | 1 ACCESS CONTROL 1. access control is a means of controlling who enters a location and when. 2. The person entering may be an employee, a contractor or a visitor and they may be on foot, driving a vehicle or using another mode of transport. 3. The location they’re entering may be, for example, a site, a building, a room or a cabinet. Two Types of Access Control: 1. Physical And 2. Logical. 1. Physical access control limits access to campuses, buildings, rooms and physical IT assets. 2. Logical access control limits connections to computer networks, system files and data. Access control systems perform identification authentication and authorization of users and entities by evaluating required login credentials that can include passwords, personal identification numbers (PINs), biometric scans, security tokens or other authentication factors. Why is access control important? The access control is to minimize the security risk of unauthorized access to physical and logical systems. Physical access control system is usually referring to an electronic security system.
  • 2. ACCESS CONTROL SYSTEM S.PAHEERATHAN P a g e | 2 Passwords, PINs, Smart Keys, Smart Cards, etc. are generally used to authenticate people and allow them access to both physical as well as digital domains. But the problems with this type of authentication is that passwords and PINs can be easily forgotten (or hard to remember) or can be stolen; smart keys and tokens can be easily misplaced, duplicated or forgotten; smart cards with magnetic strips can be easily corrupted.  Use of Biometrics in authentication and verification 1. Every human being possesses certain unique features in terms of both physiological and behavioural characteristics that are different from everybody else. 2. a person’s biometrics or biological traits cannot be stolen, forgotten or misplaced and hence they provide a much better, secure and reliable way to authenticate an individual when compared to the traditional methods. 3. commonly used Biometrics are fingerprints, iris, face, geometry of hand, speech, gait, signature and keystroke. Biometric Sensors A Biometric Sensor is a device (or a transducer, to be specific) that converts the biometric trait of an individual into electrical signals.
  • 3. ACCESS CONTROL SYSTEM S.PAHEERATHAN P a g e | 3 Biometric Sensors are usually semiconductor devices that processes images from an individual’s physical characteristics using complex algorithms. Many physical characteristics of a person like face, iris, fingerprints, etc. are scanned by a Biometric Sensor and are converted to a digital image using an Analog – to – Digital Converter. This digital information of the person is stored in a memory and is used to verify or authenticate his/her identity. Biometric System There are two types of Biometric operations that can be performed using the images captured by Biometric Sensors. They are: 1. Identification 2. Verification  In Identification mode, a Biometric System identifies a person from the pool of enrolled personnel by searching the database and based on match for biometrics. This mode answers the “Who am I?” question about a person.  I verification mode, the Biometric System verifies the person’s identity based on the previously enrolled
  • 4. ACCESS CONTROL SYSTEM S.PAHEERATHAN P a g e | 4 biometrics. In this mode, the “Am I whom I claim to be?” question about an individual is answered.  MICROPHONE/MIC (WIRED & WIRELESS)  SPEAKER/LOUD SPEAKER  SOUND MIXER / MIXING CONSOLE  SOUND AMPLIFIER/POWER AMPLIFIER  MUSIC PLAYER  CABLES the operation of a typical Biometric System can be divided into three components. They are: 1. Enrolment 2. Matching (or Testing) 3. Decision Making
  • 5. ACCESS CONTROL SYSTEM S.PAHEERATHAN P a g e | 5 Types of Biometric Sensors  Fingerprint Sensors  Face Recognition  Iris Recognition  Speech Recognition  Hand Geometry  Signature Verification Fingerprint Sensors
  • 6. ACCESS CONTROL SYSTEM S.PAHEERATHAN P a g e | 6 The device that is used to capture digital image of a fingerprint pattern is known as Fingerprint Sensor. The captured image, which is known as live image, is processed to create a digital template with extracted features. This template is stored in the database for matching. Based on the fingerprint ridges, there are three fingerprint patterns called: 1. Loop 2. Arch 3. Whorl
  • 7. ACCESS CONTROL SYSTEM S.PAHEERATHAN P a g e | 7 Based on the technology used to capture the fingerprint images, fingerprint sensors are further classified into different kinds.  Capacitive Sensors  Optical Sensors  Ultrasonic Sensors  RF Sensors  Thermal Sensors  Pressure Sensors Watch these videos for more info 1. https://www.youtube.com/watch?v=2QTFiQVdrgg 2. https://www.youtube.com/watch?v=trn_R5TOaGU 3. https://www.youtube.com/watch?v=XvR6ww7F54 w 4. https://www.youtube.com/watch?v=9y-yYEUS8c4 5. https://www.youtube.com/watch?v=MEQ451O6og M